Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature.…
Researchers from FireEye warn that China-linked APT groups continue to target Pulse Secure VPN devices to compromise networks. Cybersecurity researchers…
Microsoft experts uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind SolarWinds hack. Microsoft Threat Intelligence…
The FBI revealed that foreign hackers compromised the network of a local US municipal government by exploiting flaws in an…
NASA identified more than 6,000 cyber-related incidents in the last four years, according to a report published by its Office…
Researchers discovered about 50,000 IPs across multiple Kubernetes clusters that were compromised by the TeamTNT.threat actors. Researchers from Trend Micro reported…
Google experts discovered a new variant of Rowhammer attack against RAM memory cards that bypasses all current defenses Google researchers…
The Belgian interior ministry was targeted by a "sophisticated" cyber attack, a spokesman told RTBF public television on Tuesday. The…
An Iran-linked threat actor tracked as Agrius employed data-wipers disguised as ransomware to destroy targeted IT infrastructure. Researchers from cyber-security…
Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. Researchers at…
This website uses cookies.